shutterstock 4600 TEST SIZE V1 051716

 

 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Cloud Privacy Best Practices Technology Business Computing Hackers Backup Network Security Malware Hosted Solutions bgc Microsoft roundup nonprofit Google Disaster Recovery Software VoIP Managed IT Services Business Business Continuity Alert Mobile Devices Outsourced IT Data Windows 10 Email Smartphones Ransomware Hardware Innovation communications Managed IT Services Android Server Internet Saving Money IT Support Small Business IT Services Cybercrime Office Data Backup Productivity Efficiency Computers Browser Computer Recovery Cloud Computing Business Management Windows Quick Tips Telephone Systems Social Engineering User Tips Save Money Smartphone Money BYOD Cybersecurity Passwords Virtualization Hacking Mobile Device Management Managed IT Mobility BDR Work/Life Balance Social Media Proactive IT Miscellaneous Holiday Bring Your Own Device Upgrade Two-factor Authentication Collaboration Productivity Office Tips Internet of Things App Data Recovery Communication How To Firewall Wi-Fi Chrome Phishing Private Cloud Law Enforcement Remote Monitoring Flexibility Vulnerability Avoiding Downtime Managed Service Provider Network Budget IT Support Health Office 365 Microsoft Office Remote Computing Business Intelligence Information Technology Windows 10 Facebook History Black Market Compliance Password Bandwidth Google Drive Gadgets Data Breach HaaS Artificial Intelligence Automation Operating System Safety Value Redundancy CES IT Plan Identity Theft Workplace Tips SaaS Applications Solid State Drive Workers Legal Credit Cards Big Data Word Router OneNote Unsupported Software Charger Risk Management Mobile Device Electronic Medical Records Employer-Employee Relationship Business Owner Data Security Spam Blocking Keyboard Content Filtering The Internet of Things Hiring/Firing Government Computing Infrastructure Emergency Marketing Save Time Computer Care Patch Management Spam Automobile Physical Security Mobile Computing Samsung HIPAA Scam Apps Wireless Technology Data Storage Data Management End of Support Battery Data storage IT Management Worker VPN Benefits Education Monitor Hard Drives Multi-Factor Security Knowledge Tip of the week Rootkit Entertainment Theft PDF Tools FENG Troubleshooting Network Congestion Smart Technology Content Management Chromecast Trending Relocation Files Windows Server 2008 Training Instant Messaging Cortana Two Factor Authentication Users Blockchain Lifestyle Humor Data Warehousing Windows 7 Vendor Management Content Best Practice Fraud Books Search Google Apps Mobile Assessment IT Consultant Virtual Reality Human Resources Data Protection Regulations Settings Going Green Amazon Hosted Solution How to Infrastructure YouTube Professional Services CrashOverride Television Leadership Worker Commute Staff Software Tips User Error Politics Video Games Amazon Web Services Downtime Password Manager Wireless Software as a Service Meetings Public Computer Reputation Comparison Colocation Servers Unified Threat Management Online Shopping Robot Business Mangement Update Data loss Document Management Customers Techology Specifications HBO Evernote Flash Windows 10s Cleaning Experience Laptop Shadow IT Gmail WiFi Screen Mirroring Outlook webinar Employer Employee Relationship Millennials Wireless Charging Hacker Sports Sync Public Cloud Touchpad Recycling NarrowBand Google Docs Cast IBM Conferencing Computer Accessories Workforce Apple Fiber-Optic Internet Exlporer Telephony eWaste Website Supercomputer Frequently Asked Questions Netflix Bluetooth Telecommuting iPhone Cables Skype Audit Transportation Criminal Voice over Internet Protocol Current Events Excel Audiobook Remote Work Unified Communications Advertising Start Menu Computer Fan Loyalty USB Scalability Thank You Digital Signature Congratulations nonprofits